Acuant Talks Identity Proofing with TAG Cyber

Recently, we spoke with Ed Amoroso of TAG Cyber on the topic of identity verification solutions today in the marketplace. Here are some of the highlights:

     Our discussion covered the wonderful work they are doing to simplify, integrated, consolidate, and secure the tangle of identification documents, and associated validation processes that are not exactly the pride of our society. I think their approach is solid, and I’ll try to share with you below what I learned:

“Our purpose at Acuant,” explained Kevin Vreeland, Managing Director, “is to simplify the identity validation ecosystem to maximize the trust of any transaction that is reliant upon an individual’s identity. We believe identity is the new currency, and it is more important than ever that PII is protected. Acuant accomplishes this by providing workflows that are fast and secure by streamlining the lifecycle process for establishing confidence in a reported identity.”

The Acuant solution is offered in three levels: First, images of credential information such as driver’s licenses are captured into the app to support basic tasks including familiar auto-fill into on-line forms. Second, strong authentication is performed in seconds by more than fifty forensic tests including biometric facial recognition, often needed for higher assurance. And third, the solution supports both RFID and a manual review for the most critical applications.

Our conversation moved quickly to privacy, and establishing confidence to put all of one’s credentials into one bucket. Vreeland explained the company’s approach to encryption and its disaggregation of credentials as they are validated, significantly reduce the risk of any compromise. He stressed the company’s belief that individuals should be in control of PII. He also outlined rational use-cases for stored and non-stored credentials by the app provider.   

 

You can read the full blog here.

At Acuant we are mindful that a mission must be founded upon a set of core values and business principles. For us this means that we take a customer centric approach that defines our purpose, guides our products and harnesses the innovation and enthusiasm of our people.

We recognize that the need for strong, customer-friendly identity proofing solutions has never been greater. As PII is continuously jeopardized, Acuant serves to find a way to create trusted transactions that puts individuals at ease and in control, while simultaneously allowing businesses to address their appropriate level of risk.

 

Contact us today to learn more

Buzz from the Know Identity Conference 2018

The 2nd annual Know Identity Conference just took place in Washington DC and Acuant was in attendance to catch this year’s buzzworthy topics. A major one was how firms will establish consumer identity especially in the digital world and how/when most consumers would use digital identity.  Enter SSI. The industry has unified around the term self-sovereign identity (SSI) to represent both the digital identity credential and the right for the consumer to control access to it and who gets what portion of their identity.

 

So how do we test whether digital identity is ready for the consumer mainstream? One line of thought by David Birch of Consult Hyperion, was that by taking care of 3 audiences of online consumers (the 3 W’s), that would be enough to ensure the right amount of protection to make business transactions secure. The 3 W’s are witness protection, whistle blowers and people who browse explicit material (wankers in his informal British prose). If digital identities allow the 3 W’s to browse anonymously and protect their transactions, then we can all have an appropriate level of security in the digital world.

 

Scott Galloway, a professor at NYU Stern School of Business, worries about the ever-increasing control of personal information in the digital world by four companies: Google, Facebook, Amazon and Apple.  He calls these firms the brain, heart, stomach and libido of the digital world.  These four companies each create more revenue each year than the GDP of all other nations except USA, China, Japan and Germany.  Scott argued these companies are already monopolies and innovation could gather renewed energy if these companies were broken into smaller entities, further pondering that they may have just too much information about individual consumers. In the backdrop of the recent Facebook debacle and the pending European GDPR laws, protection of consumer information was at the forefront of many conversations.

 

The General Data Protection Regulation (GDPR) goes live May 2018.  The hardest part of compliance with this new regulation mentioned by many of the panelists, is compliance with the laws mandating the right for a consumer to be “forgotten” by any company.  With the size and breadth of systems in many companies, the right to erasure of a consumer may prove a daunting task. The days of selling consumer contact lists will be over in the EU come May and the UK is currently racing down the path to adopt similar laws as GDPR by the end of 2018.

 

Biometrics and its various forms was also highly visible at the conference.  Most sessions and panels discussed biometrics whether it was facial recognition, iris, fingerprint or voice as the natural next step in security. Most experts suggested a multi-modal approach to biometrics (more than one biometric) as there always needs to be a fallback when something does not work quite right. The fear factor of biometrics is much lower now and with adoption rates increasing we should all expect to see more usage across industries.

 

Lastly, there was a theme of hope as digital ID was seen as a solution to the unbanked and underrepresented for many parts of the world.  Many areas where government IDs are made available at birth (but other forms of identification are scarce, unreliable or inaccurate), could benefit from digital IDs backed by initial ID documents.  With Washington DC as a backdrop, new ways of proving identity with low friction, high confidence and mobility shined through.

 

 

security white paper cta

How Identity Verification Technology is Changing the Auto Industry, from Rentals to Car & Ridesharing Services

A Better Car Rental Experience with Fraud and Theft Protection

When it comes to renting a car, the first thought people have is of long lines and annoying paperwork including photocopying of IDs and insurance cards. It is not a pleasant experience, but one that most will justify going through for the outcome. Smart rental companies are realizing that in order to retain and attract customers, they need to make this experience faster and less painful. Today, consumers have many choices that compete with rentals.

Technology that automates the intake of ID documents like driver’s licenses and insurance cards, speeds up the process and protects businesses. Simply scan an ID to auto-populate the information into CRM or Dealer Management Systems and store data and images of the ID, no photocopies or pages of paperwork needed. With mobile devices, businesses can offer rental cars from any location or even drive the vehicle to the customer.

Another benefit to the rental companies is the protection ID verification provides. In the same swipe or mobile capture of an ID, the license can be verified in seconds to ensure that it is not fake and the driver is who they claim to be. This prevents fraud by catching fake IDs and provides a copy of the license image on file which is needed in many states to submit claims for stolen vehicles. Rental theft can be very costly and is often accomplished with only the aid of a fake ID.

Easy and Secure Car Sharing

The car sharing market continues to grow as many would-be car owners in cities and urban areas feel it is more economical and even more environmentally friendly to opt for a service such as Zip Car. Drivers can simply pick up vehicles they locate on a mobile app and can drive them to a destination for easy drop-off.

ID verification allows for quick and easy onboarding of members for such service providers. They can verify the identities of their users, ensure that a license is valid and have their ID images and data on file. Facial recognition match or other biometric technology can then be used to unlock cars at their pick-up location. The process is easy, fast, convenient and most importantly, secure. Businesses can protect their fleet and know who is driving their cars.

Safer Ridesharing Services

Another extremely popular form of transportation is ridesharing services such as Uber and Lyft. New services are popping up worldwide due to the convenience and ease of use this model provides. Users simply access a mobile app for on-demand service, but the service is not without pitfalls as evidenced by many stories of rides gone bad. This can be due to a bad customer or a bad driver. In both cases, it is important to know the identity of both parties.

Ride Sharing companies must properly identify their drivers and know who is providing services at all times. ID verification technology allows for this with proper validation for customer onboarding and proper validation and screening of drivers. Riders should also provide proper ID when signing up so that drivers will always know who is in the car with them should any trouble or danger arise, and drivers should have to initially and continually prove their identity. A preliminary check will catch fake ID’s and continual checks for drivers via biometrics such as facial recognition match, can ensure that the driver is who they claim to be throughout service times.

Acuant Announces 3 New Auto Partners

Navotar

Navotar is a worldwide provider of fleet management software for rental companies, dealerships, and automotive manufacturers. Through this partnership, car rental customers will now be able to do a quick scanning of passports and driver’s license for data extraction into Navotar customer management systems, while at the same time verifying their validity in seconds. Acuant optimizes operations and provides an additional layer of security against fraud.

Working in real time, the partnership eliminates manual screening errors, speeds up the document inspection process and significantly reducing employee training, operating costs and customer inconvenience.

Clutch Technologies

Clutch’s vehicle subscription platform provides the automotive industry with an innovative and scalable way to enable vehicle subscription access. Clutch chose Acuant’s patented technology to authenticate driver’s licenses. As part of the verification process, Acuant extracts biometric and alphanumeric data from IDs and applies 50+ forensic tests instantly. Clutch will also perform facial recognition match to validate users. Acuant FRM is as easy as taking a selfie and comparing it to biometric data contained in the government-issued ID. Results are given in seconds, comparing the face biometrics of a selfie to the image on the ID and include a liveness detection test to prevent fraudsters from using static images by ensuring that a live person is in front of the camera.

 

Pony Car Sharing

Pony Car Sharing is Romania’s first and largest car sharing service. Offering flexible pricing models, cars are parked on the street where users unlock them with mobile phones and can track them in real time on the app. Pony Car Sharing chose Acuant to verify members during onboarding, automatically capturing and validating identification information. Identity information will then accurately auto-populate the Pony Car Sharing database. This eliminates manual entry, photocopying and paperwork. Pony Car Sharing will also employ facial recognition match for stronger authentication. Customers using the Pony Car Sharing app can be remotely authenticated and unlock cars with their mobile phones.

To learn more about Acuant Solutions Book a Meeting today!

 

 

5 Reasons Why Every Business Needs Identity Proofing Solutions

Securely gathering information from customers and verifying the identities of those who provide it is becoming a simpler task with the advent of identity proofing solutions. There are solutions that enable businesses to capture, process and verify customer information in a single step without compromising customer’s personal information.

Modern identity verification platforms combine hardware systems, software and even cloud-based solutions to make the verification process as easy as swiping a credit card. No more paper forms to fill out, no manual typing of information, no long lines and you can even conduct transactions remotely from your phone that once required a physical visit.

With major data breaches and hacking making headlines regularly (see the latest on Facebook), and identity theft on the rise, installing identity proofing solutions would seem to be a no-brainer. There are many cost-efficient, and even revenue enhancing options, that easily integrate into any environment in any industry.

Still not convinced? Here are 5 reasons why your business should be investing in identity solutions now.

1. Streamlined Processes, Greater Accuracy & Enhanced Operations Increase Revenue

Whether they are paper-based or computerized, using forms to gather customer information has its limitations. Customers spell things incorrectly, leave things blank or mistype information. Handwriting can be difficult to read on paper-based forms, leading to data entry errors. Even your own employees can make mistakes when typing information or merging it with other data in the system. Automating data capture and the filling in of ID data into electronic forms and into CRM systems and electronic customer records virtually eliminates manual input and error.

A simple swipe or mobile capture of a driver’s license, state-issued ID, passport, or other government-issued ID easily captures relevant information, populates the database, and verifies the identity of customers in a single step that takes seconds. This saves time, money and frustration by simplifying a formerly cumbersome process that led to high abandonment rates and decreased operational efficiency.

2. Better Customer Relationships Increase Satisfaction & Loyalty

By eliminating the annoying pile of paperwork that most customers fill out on their first visit and dramatically reducing keystrokes via computers and mobile devices, you can be one step ahead of the competition, making your business more customer-friendly from the start. Increase conversion rates and see abandonment rates rapidly decline.

Add to that the additional time you can spend with your patients, clients or customers when you eliminate the lengthy check-in process, and identity solutions become a great way to start customer relationships on a positive note leading to increased satisfaction and long-term loyalty.

Online, e-commerce and mobile app transactions will appreciate the streamlined process enables them to proceed through to checkout or complete ID verification with minimal input of information and effort, even using facial recognition match via a selfie for quick and easy access.

Finally, you’ll build trust with customers when you take the time to verify their information and assure them of their personal data protection. Customers will appreciate your attention to safeguarding their identity, building rapport and brand loyalty.

3. Increased Security to Protect Against Increasingly Sophisticated Attacks

With identity theft, major data breaches and hackings on the rise, it’s more important than ever to verify the identities of customers and other visitors that enter your physical business (store, facility, practice, or campus) and also digital ones (online stores, platforms, etc.). Identity proofing solutions can instantly verify the identity of any visitor on premise or remotely and ensure both customers and employees feel safer.

The integrated technologies of many identity solutions can give your business the ability to process and verify visitors quickly while capturing detailed information and images from visitor IDs, business cards, or passports. You can even instantly check against global watch lists such as OFAC and Interpol, or create your own to flag persons of interest.

4. Prevent & Deter Fraud

Identity proofing doesn’t just verify that the credit card or other payment method is valid. It also verifies the identity of the card user, effectively preventing transactions from lost or stolen credit cards.

By instantly verifying the identity of shoppers both in-person and online, you’ll decrease fraudulent transactions which lead to lost merchandise and chargebacks that cut into your bottom line.

The cost of fraud is staggering. The average organization loses 10% of revenue from counterfeiting and it has been estimated that the value of counterfeit goods globally exceeds 1.7 trillion dollars annually – over 2% of the world’s total current economic output.

5. Enforce Age Verification & Regulatory Compliance

Identity verification technology makes it easy to comply with legal requirements imposed by state and federal laws. For example, if you serve alcohol or sell other regulated products that cannot be sold to minors, instant ID verification enables you to verify the validity of an ID and verify the age of potential customers. You stay in compliance with the law, avoid costly fines and provide a seamless customer experience.

In other highly regulated industries, such as finance, institutions can quickly and easily comply with KYC and AML regulations without worrying about compromising their customers’ PII.

New verification technology is changing the way business is done for the better. Paperwork and manual entry errors are virtually eliminated, security is increased to prevent fraud, be compliant and meet regulatory requirements. This can all be accomplished while at the same time providing a better customer experience. It’s a win-win for everyone.

 

 

security white paper cta

Acuant Named the Provider of Identity Verification Solutions for iDentyTech Solutions

LOS ANGELESFeb. 14, 2018  — Acuant, a global provider of identity verification solutions, today announced a partnership with iDentyTech solutions, a leading provider of intuitive identity management hardware and software platforms. Under the agreement, Acuant will be the provider of document validation for the iDentyTech IDT™ platform.

“Acuant’s partnership with iDentyTech allows our customers to use kiosks such as IDT Virtual Guard Tower for capturing identity documents and validating visitors on-site,” said Ephram Yeashoua, CEO of iDentytech. “With our Unified Management Platform, combining multi layers of automated identification technologies, a single guard can manage several entry points into a property or facility, ensuring only authorized people are allowed to enter. As a result, Security administrators can better secure their facilities with a great ROI whilst reducing criminal activity.”

Acuant is trusted around the world to help commercial organizations and government facilities improve and protect their business operations. Its solutions provide critical security, streamline workflows and protect against identity theft and fraud. Acuant’s AssureID patented technology extracts biometric and alphanumeric data contained in an identity document to authenticate it by applying more than 50 forensic document-specific tests and utilizing the industry’s largest document library, supporting over 196 countries.

“With AssureID integrated into iDentyTech solutions, customers can easily manage their facility’s physical security and authenticate IDs,” said Yossi Zekri, CEO of Acuant. “We are excited to partner with iDentyTech to make controlling a site easy and more secure.”

More information about securing your business can be found in Acuant’s new white paper, Protecting Your Business & Establishing Trust: The Importance of Identity Verification and How Businesses Should Choose Solutions.

About Acuant
Acuant has over 20 years of experience providing identity verification solutions to instantly reduce fraud while providing a seamless customer experience. Product offerings include intelligent data capture and auto-fill software, identity document authentication, chip and ePassport authentication with PKI, facial recognition software and expert manual review of documents. Acuant’s human assisted machine learning powers the industry’s largest identity document library covering more than 196 countries.

Solutions meet regulations such as KYC, AML and PII for any industry. Partners include start-ups, Fortune 500 and FTSE 350 organizations. For more information, please visit acuantcorp.com

 

 

 

 

 

Card-not-present Fraud Increases as Consumers Move Online and Mobile

One of the biggest fraud warnings in the US and around the world for 2017 was credit card fraud, particularly card-not-present fraud. In Europe, card-not-present fraud increased from 50% gross loss in 2008 to 70% last year, with most fraud impacting the UK and France. Fraud experts warn this is just the beginning. The research firm Juniper predicted a 71 Billion USD loss globally due to card-not-present fraud over the next 5 years. As history dictates, when technology advances, so do criminals.

Shoppers and businesses were warned that there might be a massive fraud spike during Black Friday weekend. But in an impressive turn against the tide, it looks like US retailers were well prepared to combat fraud this season. Unlike what was initially predicted, credit card fraud dropped for the first time over Black Friday weekend by 29%. After the industry was rocked by huge data breaches from Target and other retailers, it looks like the investments made to boost security paid off.

Technology Is the Problem and the Solution for Retail

This good news for the retail industry might be a temporary reprieve. The transition to EMV chips in credit cards plays a big role in reducing point-of-sale fraud and might account for the drop in fraud during the holiday shopping season. The reality is that fraudsters will continue to follow the consumers.

In the US, m-commerce has been increasing year-over-year. For this holiday shopping season, purchases made on mobile devices were a 36.9% of all sales, and e-commerce was up 17% from last year. As more consumers move to online and mobile shopping, expect to see more card-not-present fraud as well. Public wi-fi can encourage more consumers to use their mobile devices to shop, but all those transactions also create opportunities for hackers to get sensitive information through key-logging, phishing, and other scams. Consumers might feel protected by all the technology they are using and have no idea how just how much risk is actually connected to these conveniences. For example, shoppers in India often have 3 or more shopping apps on their smartphones and almost half of all consumers have been victims of retail fraud.

Retail shopping isn’t the only industry that should be bracing for more card-not-present fraud. The recent data breaches at financial institutions and on sharing economy platforms show that pretty much any kind of online or mobile transaction poses a high risk to consumers and businesses.

Invest in Security Now or Pay a High Cost Later

One effective security measure to protect against card-not-present fraud is to add multi-factor or biometric authentication to tie the transaction to an actual person. Linking transactions to identities can reduce the risk of fraud both at check-out as well as help to lower the amount of customer data that businesses manage and store. This means businesses can protect against fraud while also minimizing the risk of being a target for data breaches.

Investing in customer data protection and keeping transactions secure is essential in creating customer trust and loyalty.  With its high competition and slim margins, the retail industry has learned that it cannot afford to be reactive and was effective in curbing point-of-sale fraud during the peak shopping season. We learned this year that other industries wrongly thought themselves to be immune to hackers. The consequences of major data breaches can last for years and be a crippling cost to many businesses.

As you prepare for 2018, make sure your business is incorporating the best practices for securing customer data and preventing card-not-present fraud. It is more cost-effective to invest in security measures now than to pay a much steeper price later.

 

Acuant Solutions for Customer ID Verification

Fraudsters Want Your ID Information. What Are You Doing to Stop Them?

In 2016, identity theft amounted to $16 billion and affected more than 15.4 million people in the United States. Your identity is arguably your most valuable asset, but how often are you aware of all the ways that you use it to transact? With the lines of physical and digital identity becoming increasingly blurred, it’s more important than ever to safeguard your identity during transactions.

Are you doing enough to ensure you’re keeping your personal information – and your customers’ information – safe from fraudsters?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Every day, Americans make transactions by swiping, scanning or chip-reading – from grabbing a cup of coffee to purchasing airline tickets. The convenience of these transactions, it seems, trumps concerns of information falling into the wrong hands. But the time has passed for simply hoping our ID information – and our customers’ ID information – will continue to be safe, simply because you’ve seen no evidence it’s been compromised.

Just a Day in the Life for Identity Thieves

Let’s look at a typical day anyone could have to see how easily one can expose their ID information to considerable security risks.

Mobile banking. Shortly after leaving the office, a person decides to check the balance of their checking account. They use the local coffee shop’s free Wi-Fi, because like 67% of Millennials, they use a mobile app to access their banking information. Though on an open network, they tap in their ID, password and perhaps other Know Your Customer (KYC) information, as required by anti-money laundering (AML) regulations. Did a fraudster track their every keystroke?

Click to download the free infographic: Where Does Your Identity Take You in a Day?

Small business transactions. Because this person is now running late to a doctor appointment, they pull out their credit card to engage one of the 1,000 bike-sharing services across the country, a market that is expected to become a $6.1 billion business by 2020. Are the security measures employed by all 1,000 vendors up to par? How does this one rank?

Medical Insurance. At the doctor’s office, they check in at the front desk, making their co-pay with the same credit card and giving their medical insurance card information which is likely photocopied. Like most people, this person is more than likely unaware that 15.4 million medical records were stolen in 2016 alone, and that 301 people across the country were charged roughly $900 billion in false billing.

Remember, Identity Thieves Never Take a Vacation

Although you’re in a rest-and-relaxation mode, you still know not to leave your hotel room unlocked or your wallet on a car seat. If only you could take similar measures to protect your ID information. Here are some common transactions that require ID information on a typical vacation – and some data associated with their risk of security breaches.

Accommodations. The global vacation rental market is poised to be worth $193.89 billion by 2021. Fully 46% of customers check in using hotel loyalty programs, and loyal customers spend on average 67% more than new ones. Front desks and agencies are mostly taking your identity document photocopying it and storing it somewhere; a very insecure data capture method. All this makes vacation rental businesses likely targets for theft of identity information.

Ground transport. Uber reported that 40 million people used the ride-hailing service in 2016. Incidentally, 8,000 ride-hailing service drivers in Massachusetts failed to pass new state background checks in 2017. Similarly, car-rental agencies routinely require a check of ID documents to complete transactions and mostly use the archaic photocopy method of capturing your ID leaving you vulnerable to a paper file floating around.

The More You Know, the Better

Our free infographic, Where Does Your Identity Take You in a Day , illustrates just how important it is to protect your ID information.

Acuant provides businesses with identity proofing solutions for trusted transactions, for more information contact us here.

 

Read the Infographic

How Machine Learning is Taking Identity Proofing Solutions to a Whole New Level

Artificial Intelligence (AI) enables computers to make human-like decisions, creating efficiencies that were previously unachievable. AI powers everyday technologies such as search engines, self-driving cars, and facial recognition apps. This technology is also leveraged for consumer identity access and management to protect consumers and businesses against fraud.

The Growth of ID-based Transactions

Banking, healthcare, government and many other industries employ ID verification and authentication to get accurate information about their customers and prevent ID fraud. As fraudulent transactions continue to rise, the need for a strong, customer-friendly identity proofing solution becomes critical.

Artificial Intelligence, and its subsets of machine learning and deep learning, make it possible to accurately process, verify, and authenticate identities at scale. Machine learning enables solutions to continually improve by learning from their data collection mechanism. This, in turn, informs the operation and performance of the software. For an in-depth look at machine learning and how it applies to your industry, read our latest white paper: Beyond Machine Learning.

Machine Learning for ID Proofing

Machine learning is an extremely efficient tool for discerning between real and fraudulent IDs. Computer software that is constantly learning and correcting itself can process millions of transactions at a rate unachievable by human experts.

However, IDs are physical documents that endure wear and tear, and may feature manufacturing discrepancies. If the model for passing or failing IDs is based on only a few samples, many real IDs will fail the test. This is where human oversight comes into play.

Machines and Humans Working Together for Highest Accuracy

Trained professionals using the software can step in to prevent bad customer experiences when the software flags a legitimate ID because it is damaged or worn.

During the rare instances where the computer fails to identify what is wrong with an ID, the professional can apply their expert eye, determine what error occurred and teach the computer how to spot the issue in the future. This creates a different method of learning where new information is being input to the learning model so the model can improve.

The benefits of machine learning combined with human expertise is the current standard in identity proofing solutions. Businesses want to be able to approve all good customers from the start with no friction. A good ID verification solution will do just that. In addition, when looking for a provider, businesses need to consider scope of expertise. Providers experienced in ID-based transactions across multiple industries help to ensure machines will have a model that has encountered multiple scenarios for failing or passing an ID.

Conclusion

Artificial Intelligence increases customer security and prevents fraud. Identity proofing providers are a trusted source to collect evidence of fraud, and through machine learning, that evidence can be analyzed and applied continuously to ensure higher accuracy.

Acuant is among the world leaders in applying machine learning to identity proofing solutions. Over the past 20 years, Acuant has accumulated the industry’s largest identity document library with government-issued ID documents and passports from over 190 countries. Acuant technology also has the ability to read characters in almost any language to ensure business are providing the most customer-friendly experience to instantly approve more good customers.

To join Acuant’s group of industry-leading partners, talk to an ID Solutions Specialist today.

 

Beyond Machine Learning

Stranger Danger: Why You Should Care About Verifying Identities in the Age of the Sharing Economy

The Sharing Economy, which in broad terms is defined as an economic system in which assets or services are shared between individuals via the internet and especially mobile apps, has become a major way in which Millennials transact. This includes conducting transactions for business, travel, on-demand services and virtually all lifestyle-type offerings for goods and services. According to Pew Research, about 72% of Americans have tried at least one platform or service.

While the rise of sharing economy apps appears to have made many luxury services and chores more convenient and accessible, there is the question of security. Not every app emphasizes security and privacy. Many use social media as a way to verify users. These are merely connected to a Facebook or other social profile, which can be easily faked. Then there is the question of employee verification. With so many services that allow users to invite providers into their private homes, a private car or a private location – one has to ask the question, how is my safety being addressed? We need only refer to Uber to see how instances of assaults by drivers and passengers have made customers, especially women, warier of these services. And we have all heard a crazy story about an Airbnb person who would not leave or destroyed the house. Wouldn’t it bring some peace of mind to know your driver, houseguest, online date, make-up artist etc., has been verified and that you know this before they enter your life?

Seeing a picture and name of your driver or delivery person does not mean necessarily that this person has been verified. Not every sharing economy platform conducts background checks and only in the last few years has ID verification become more of a concern to even the major platforms like the aforementioned Uber who now continuously verifies driver identities.

It is important for businesses to continually update their security by verifying IDs and conducting background checks. In addition, educating customers about best practices will also help to protect privacy and prevent a negative experience.

While companies catch up on their security standards, here are some tips for customers using apps and services:

  1. Learn to Spot Fake Reviews

Don’t be fooled by stellar reviews. If there are only a handful of 5-star reviews, these could have been written by personal friends. Pick someone with hundreds of good reviews and be assured that this provider is giving a consistent, positive experience.

  1. Research Company Methods of ID Verification the Background Checks

Before using any service, do some research about what kind of identity verification they use for employees and users, as well as if background checks are conducted, general policies, and whether there are outstanding lawsuits against the company. Checks such as sex offender registries, DMV records, or taking social security number information are some basic tests of a trusted service.

  1. Change your Profile Pictures

As Sharing Economy platforms become more popular, they often become targets of ID theft and confidence schemes. A good way to avoid being conned is to use a new photo not attached to any other platform that might contain personal information such as LinkedIn or even Facebook.

  1. Think Before You Speak

Don’t talk to strangers about your plans. A handyman, housekeeper, or driver from an app doesn’t need to know where you’re going or how long you’ll be away. In addition, it might be a good idea to let close friends or family know whenever you are on the road, in someone else’s home, or have someone in your own home.

 

Sharing economy platforms and services must do more to protect customer privacy and security. Verifying IDs is a crucial step in establishing trust between customers and providers. Acuant’s ID Proofing Solutions allow businesses to capture accurate ID data, ensure IDs are valid and verify identities in seconds for secure mobile transactions.

Download our idScanGo mobile app in the app store for iOS and Android to see the process in action with your own ID and insurance card.

 

 

idscango trial